Side channel attack resistant SM2 dot product architecture based on algorithm layer and operation method thereof

A channel attack and point product technology, applied in the field of cryptography, can solve the problem that the SM2 point product algorithm cannot effectively defend against multiple side channel attacks

Active Publication Date: 2019-12-24
GUANGDONG UNIV OF TECH
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the existing SM2 point product algorithm cannot effectively defend against various side channel attacks, the present invention provides an anti-side channel attack SM2 point product architecture and its calculation method based on the algorithm layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel attack resistant SM2 dot product architecture based on algorithm layer and operation method thereof
  • Side channel attack resistant SM2 dot product architecture based on algorithm layer and operation method thereof
  • Side channel attack resistant SM2 dot product architecture based on algorithm layer and operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Anti-side channel attack SM2 point product architecture based on the algorithm layer, such as figure 1 Shown, comprise preprocessing module, main control module, NAF coding and NAF precalculation module, NAF dot product module, random register module, coordinate transformation module, result output module, arithmetic unit and storage module; In the present embodiment, main The control module is the main controller PM_FSM, the random register module is the random register FSR,

[0055] The main controller PM_FSM is used to control the data transmission and operation status among the preprocessing module, NAF encoding and NAF precomputing module, random register FSR, coordinate transformation module, arithmetic unit and storage module, and control the result output module Output the final result;

[0056] The preprocessing module is used to perform randomization processing to generate three kinds of random information, and the random information is generated by a random ...

Embodiment 2

[0079] This embodiment 2 provides a calculation method based on the algorithm layer-based anti-side channel attack SM2 point product architecture of embodiment 1, such as Figure 4 shown, including the following steps:

[0080] S1. After the main controller PM_FSM receives the mode control signal and sends the dot multiplication start command, it uses the r_ctrl signal to start the preprocessing module;

[0081] S2. The preprocessing module randomizes the input of the anti-side-channel attack SM2 point product architecture based on the algorithm layer, including the initial scalar value k, the point product input base point P coordinates falling on the elliptic curve, Random numbers r, z, m, where the base point P is expressed as an equivalent projected coordinate point (xz 2 ,yz 3 , z); Let the randomized scalar value k=k+rN, N be the order of the elliptic curve;

[0082] S3. Determine the randomized NAF window value w=[2,m by the NAF encoding and NAF pre-calculation modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a side channel attack resistant SM2 dot product architecture based on an algorithm layer and an operation method thereof, and the scalar value of each dot product operation israndomized by randomizing an NAF window value, so that base point coordinates participated in each calculation are different to resist differential power consumption analysis attacks; through introducing a random shift register, redundant operation is added in a point addition and multiple point iteration process; therefore, the relation between the point doubling point operation times and the secret key is eliminated, simple power consumption analysis SPA, differential power consumption analysis DPA, high-order differential power consumption attack HO _ DPA and template attack are resisted, and pseudo operation operation is introduced into point doubling and point doubling, so that the purpose of balancing power consumption is achieved. According to the method, the problem that an existing SM2 point multiplication algorithm cannot effectively defend against various side channel attacks is solved, higher safety is achieved, other cryptographic operations under an elliptic curve cryptographic system are considered, and the resource utilization rate is increased.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to an algorithm layer-based anti-side-channel attack SM2 point product framework and an operation method thereof. Background technique [0002] The State Cryptography Administration released the SM2 elliptic curve public key cryptographic algorithm on December 17, 2010, which is very safe in mathematical theory, but due to the leakage of key information, etc. , so the cryptographic system is vulnerable to side-channel cryptanalytic attacks. The goal of the side-channel attack SM2 is to use the side-channel information leaked during the dot product operation to infer the private key and random number. [0003] At present, the traditional point multiplication operation is better than the point addition and doubling operations that need to be performed according to the key during the point multiplication operation. It has obvious conditional jumps and is vulnerable to simple powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/30
CPCH04L9/003H04L9/002H04L9/3066
Inventor 郑欣饶博熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products